Tagged articles
200 articles
Page 1 of 2
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 7, 2026 · Information Security

Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines

This article introduces Google Tink, an open‑source cryptographic library for Java, explains its design goals and primitive abstractions, and walks through concise code examples that generate keysets, perform AEAD encryption, stream large files, compute MACs, and create digital signatures, all with minimal boilerplate.

AEADGoogle TinkJava
0 likes · 13 min read
Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines
Black & White Path
Black & White Path
Apr 27, 2026 · Information Security

Self‑Built QPU Stack Claims to Factor RSA‑1024: What the Analysis Shows

Renowned cryptographer Jean‑Philippe Aumasson posted a self‑built QPU stack that allegedly factors RSA‑1024, but a detailed technical review reveals the code relies on classic algorithms, the video is merely an animation, and the claim serves as a warning for organizations still using RSA‑1024.

QPUQuantum ComputingRSA-1024
0 likes · 10 min read
Self‑Built QPU Stack Claims to Factor RSA‑1024: What the Analysis Shows
Machine Heart
Machine Heart
Apr 7, 2026 · Information Security

Can Quantum Computers Break Crypto in Minutes? Inside Google’s New Findings

Google has accelerated its post‑quantum migration deadline to 2029 after two new papers showed that Shor’s algorithm can crack secp256k1 signatures with roughly 1,000 logical qubits or about 10,000 physical qubits, dramatically shrinking the resources needed to threaten Bitcoin, Ethereum and other cryptographic systems.

BlockchainGoogleOratomic
0 likes · 16 min read
Can Quantum Computers Break Crypto in Minutes? Inside Google’s New Findings
php Courses
php Courses
Dec 25, 2025 · Information Security

How to Compute Large Integer Modular Inverses in PHP with GMP

This guide explains how to use PHP together with the GMP library to perform modular inverse calculations on large integers, covering installation of the GMP extension, loading it in code, implementing the inverse function, and important usage notes for cryptographic applications.

GMPPHPbig integers
0 likes · 4 min read
How to Compute Large Integer Modular Inverses in PHP with GMP
php Courses
php Courses
Dec 22, 2025 · Backend Development

How to Compute Large Integer Modular Inverses in PHP with GMP

This guide explains how to use PHP together with the GMP library to perform modular inverse calculations on large integers, covering installation of the GMP extension, loading it in code, implementing the inverse function, and important usage considerations.

BackendGMPPHP
0 likes · 4 min read
How to Compute Large Integer Modular Inverses in PHP with GMP
Raymond Ops
Raymond Ops
Oct 26, 2025 · Information Security

Top 10 SSL/TLS Questions Every Security Pro Must Master

This comprehensive guide covers the ten most frequently asked SSL/TLS questions, explaining protocol differences, handshake processes, certificate structures, PKI components, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the key improvements introduced in TLS 1.3.

CertificateSSL/TLSTLS 1.3
0 likes · 23 min read
Top 10 SSL/TLS Questions Every Security Pro Must Master
HyperAI Super Neural
HyperAI Super Neural
Sep 15, 2025 · Artificial Intelligence

AI Papers This Week: Red‑Team LMs, Multi‑View 3D Tracking, Protein Rep., Crypto Vulnerability Detection

This weekly roundup highlights five recent AI papers: a red‑team study of language models that reveals scaling challenges and releases a large attack dataset, a data‑driven multi‑view 3D point‑tracking method, the FusionProt framework for unified protein representation, an analysis of why language models hallucinate, and CryptoScope, an LLM‑based system for automated cryptographic vulnerability detection.

3D trackingAIRed Teaming
0 likes · 6 min read
AI Papers This Week: Red‑Team LMs, Multi‑View 3D Tracking, Protein Rep., Crypto Vulnerability Detection
Code Wrench
Code Wrench
Sep 12, 2025 · Information Security

Master Secure Go Cryptography: Common Pitfalls & Best Practices

This article provides a comprehensive guide to Go cryptography, covering fundamental concepts, common mistakes like using math/rand for keys or RSA v1.5 padding, correct implementations with crypto/rand, AES‑GCM, RSA‑OAEP/PSS, password‑derived keys, performance benchmarks, and practical testing strategies.

AESGoRSA
0 likes · 12 min read
Master Secure Go Cryptography: Common Pitfalls & Best Practices
Chen Tian Universe
Chen Tian Universe
Sep 7, 2025 · Blockchain

Web3's Payment Revolution: Blockchain, Token Economics, and Decentralized Architecture Explained

This article builds a comprehensive Web3 knowledge framework, tracing the paradigm shift from Web2’s data‑centric models to a decentralized ecosystem where blockchain, cryptography, and token economics empower users with true data ownership, new financial primitives, cross‑chain infrastructure, and a reimagined payment landscape.

BlockchainDeFiDecentralization
0 likes · 34 min read
Web3's Payment Revolution: Blockchain, Token Economics, and Decentralized Architecture Explained
Liangxu Linux
Liangxu Linux
Aug 24, 2025 · Information Security

Master OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This guide explains the fundamentals of SSL/TLS, why transport‑layer encryption is used, and provides step‑by‑step Linux OpenSSL commands for symmetric and asymmetric encryption, decryption, hashing, password generation, random data creation, and Base64 encoding, complete with examples and key options.

Base64LinuxOpenSSL
0 likes · 11 min read
Master OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
Alimama Tech
Alimama Tech
Aug 13, 2025 · Information Security

How Private Set Operations Secure Data Collaboration in the Big Data Era

Private Set Operations (PSO) enable multiple parties to perform set intersections, unions, and related computations on encrypted data, preserving privacy through cryptographic techniques such as public‑key encryption, oblivious transfer, and garbled circuits, and are applied across advertising, finance, healthcare, and government for secure data collaboration.

AdvertisingPrivacy Computingcryptography
0 likes · 20 min read
How Private Set Operations Secure Data Collaboration in the Big Data Era
AntTech
AntTech
Aug 7, 2025 · Information Security

USENIX Security 2025 Live: Crypto DoS, Secure Graph Analysis, Video Forensics

The upcoming USENIX Security 2025 live session in Seattle will showcase three cutting‑edge papers: X.509DoS exposing denial‑of‑service flaws in cryptographic libraries via malformed certificates, GraphAce delivering communication‑efficient two‑party secure graph analysis, and RollingEvidence leveraging rolling‑shutter effects for proactive video forensics.

USENIXcryptographygraph-analysis
0 likes · 7 min read
USENIX Security 2025 Live: Crypto DoS, Secure Graph Analysis, Video Forensics
Su San Talks Tech
Su San Talks Tech
Jul 15, 2025 · Information Security

Master the 7 Most Essential Encryption Algorithms for Secure Systems

Explore the seven most commonly used encryption algorithms—including MD5, SHA families, HMAC, AES, DES/3DES, RSA, and DSA—detailing their principles, Java implementations, performance, and practical security guidelines, while highlighting real-world attack scenarios and best‑practice recommendations for robust information protection.

HashingJavaasymmetric encryption
0 likes · 9 min read
Master the 7 Most Essential Encryption Algorithms for Secure Systems
php Courses
php Courses
Jun 25, 2025 · Backend Development

How to Compute Large Integer Modular Inverses in PHP with GMP

This guide explains how to install the GMP extension, load it in PHP, and use the gmp_invert function to calculate modular inverses of large integers, providing a practical solution for cryptographic and number‑theoretic problems.

GMPPHPbig integers
0 likes · 4 min read
How to Compute Large Integer Modular Inverses in PHP with GMP
MaGe Linux Operations
MaGe Linux Operations
Jun 22, 2025 · Information Security

Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This guide explains the fundamentals of SSL/TLS, why encryption occurs at the transport layer, and provides comprehensive OpenSSL command‑line examples for symmetric encryption/decryption, asymmetric key generation, hashing, password creation, and random number generation, illustrating each operation with clear syntax and usage notes.

OpenSSLSSLTLS
0 likes · 14 min read
Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
MaGe Linux Operations
MaGe Linux Operations
May 24, 2025 · Information Security

Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know

This article presents the ten most frequently asked SSL/TLS questions, covering protocol differences, handshake mechanics, certificate structure, PKI, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the improvements introduced in TLS 1.3, while also highlighting why mastering these concepts is essential for security professionals.

PKISSLTLS
0 likes · 23 min read
Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know
Test Development Learning Exchange
Test Development Learning Exchange
Apr 30, 2025 · Information Security

Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR

This article presents concise Python examples for a wide range of encryption and encoding methods—including MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, and XOR—explaining their usage scenarios and highlighting the importance of selecting appropriate cryptographic techniques for security.

AESHashingRSA
0 likes · 7 min read
Common Encryption Techniques in Python: MD5, SHA‑256, Base64, AES, RSA, HMAC‑SHA256, Fernet, PBKDF2, Blowfish, XOR
AntTech
AntTech
Apr 23, 2025 · Information Security

Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025

The International Symposium on Computer Architecture (ISCA) 2025 accepted two Ant Group research papers—FAST and Neo—detailing novel fully homomorphic encryption accelerators that combine cryptographic optimizations with hardware design to achieve significant performance gains for privacy‑preserving computation.

Ant GroupFHEISCA 2025
0 likes · 4 min read
Two Ant Group Research Papers on FHE Accelerators Accepted at ISCA 2025
Python Crawling & Data Mining
Python Crawling & Data Mining
Apr 18, 2025 · Information Security

Master Android Encryption: From MD5 to RSA with Java Code

This tutorial explains why encryption matters in Android reverse engineering, distinguishes standard and custom algorithms, lists common hash, symmetric, and asymmetric methods, and provides complete Java code examples for Hex, Base64, MD5, SHA‑1, MAC, DES, 3DES, AES, and RSA, all runnable in Android Studio.

Hashasymmetriccryptography
0 likes · 20 min read
Master Android Encryption: From MD5 to RSA with Java Code
Cognitive Technology Team
Cognitive Technology Team
Mar 22, 2025 · Information Security

Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances

The article examines how cryptographic watermarking can secure AI‑generated content by embedding robust, undetectable, and unforgeable signatures, reviews existing methods such as SynthID and Video Seal, and discusses recent research using pseudo‑random codes, error‑correcting codes, and diffusion inversion to improve watermark resilience.

AI watermarkingLDPCcryptography
0 likes · 9 min read
Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances
Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

OpenSSLcommand-linecryptography
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
Python Programming Learning Circle
Python Programming Learning Circle
Feb 15, 2025 · Information Security

Building a File Encrypter in Python with AES and PBKDF2

This tutorial walks readers through building a Python‑based file encrypter using the Pycryptodome library, covering AES‑CBC encryption, PBKDF2 key derivation, functions for encrypting and decrypting files, environment setup on Windows, macOS and Linux, and a simple driver script for testing.

AESFile SecurityPyCryptodome
0 likes · 12 min read
Building a File Encrypter in Python with AES and PBKDF2
IT Architects Alliance
IT Architects Alliance
Jan 12, 2025 · Fundamentals

Quantum Computing: Principles, Applications, and Impact on IT Architecture

The article explains how quantum computing, with its qubit superposition and exponential speed‑up, is reshaping IT hardware and software, enabling breakthroughs in drug discovery, finance, AI, and secure communications while facing commercialization challenges such as high costs and talent gaps.

IT ArchitectureQuantum Computingartificial intelligence
0 likes · 12 min read
Quantum Computing: Principles, Applications, and Impact on IT Architecture
AntTech
AntTech
Dec 6, 2024 · Information Security

Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations

Ant Financial's MorseCrypto team secured first place in the 2024 Financial Cipher Cup second‑stage competition by delivering highly optimized SM2, SM3, and SM4 implementations on X86 and ARM platforms that achieve up to 4.3‑times faster verification while meeting strict security and memory constraints.

AssemblyPerformance OptimizationSM2
0 likes · 4 min read
Ant Financial's MorseCrypto Wins First Place in the 2024 Financial Cipher Cup Second Stage with High‑Performance SM2/SM3/SM4 Implementations
Model Perspective
Model Perspective
Nov 20, 2024 · Fundamentals

Can π Encode Anything? Unveiling Its Infinite Randomness and Information Power

π’s endless, non‑repeating decimal expansion behaves like a universal information reservoir: any finite digit sequence—birthdates, historic years, or arbitrary data—appears somewhere, and if the unproven normal‑number hypothesis holds, π could serve as an infinite random number generator for cryptography, art, and scientific modeling.

cryptographydata hidinginformation theory
0 likes · 6 min read
Can π Encode Anything? Unveiling Its Infinite Randomness and Information Power
AntTech
AntTech
Nov 13, 2024 · Artificial Intelligence

Nimbus: Secure and Efficient Two‑Party Inference for Transformers

The article introduces Nimbus, a novel two‑party privacy‑preserving inference framework for Transformer models that accelerates linear‑layer matrix multiplication and activation‑function evaluation through an outer‑product encoding and distribution‑aware polynomial approximation, achieving 2.7‑4.7× speedup over prior work while maintaining model accuracy.

TransformersTwo-Party Computationcryptography
0 likes · 6 min read
Nimbus: Secure and Efficient Two‑Party Inference for Transformers
Cognitive Technology Team
Cognitive Technology Team
Oct 27, 2024 · Blockchain

What Is Blockchain? Core Concepts and Fundamentals

This article explains blockchain by distinguishing its narrow definition as a cryptographically linked data structure from its broader view as a decentralized infrastructure, and then details blocks, headers, bodies, hash functions, chain structure, Merkle trees, timestamps, asymmetric encryption, P2P networking, data propagation, and validation mechanisms.

BlockchainConsensusMerkle Tree
0 likes · 11 min read
What Is Blockchain? Core Concepts and Fundamentals
IT Services Circle
IT Services Circle
Oct 22, 2024 · Information Security

Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark

This article provides a step‑by‑step analysis of a TLS 1.2 HTTPS handshake captured with Wireshark, explaining the ClientHello, ServerHello, certificate parsing, key‑exchange messages, master secret derivation, and the final encrypted application data exchange.

HTTPSTLSTLS Handshake
0 likes · 14 min read
Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark
AntTech
AntTech
Oct 18, 2024 · Information Security

CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts

The second Confidential Computing Forum at CNCC2024, held on October 26 in Hangzhou, gathers leading experts to discuss TEE‑based secure computing, present cutting‑edge research on confidentiality, side‑channel attacks, collaborative trust, and cryptographic applications, and outlines future directions for data security in the digital economy.

TEEcryptographydata security
0 likes · 10 min read
CNCC2024 Confidential Computing Forum – Schedule, Speakers, and Research Abstracts
MaGe Linux Operations
MaGe Linux Operations
Sep 15, 2024 · Information Security

Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained

This article provides a comprehensive overview of TLS handshakes, detailing the RSA and ECDHE key exchange mechanisms, their step-by-step processes, security properties, and the differences between TLS 1.2 and TLS 1.3, including cipher suite structures and certificate validation.

ECDHERSATLS
0 likes · 21 min read
Understanding TLS Handshakes: RSA vs ECDHE and TLS 1.3 Explained
Python Programming Learning Circle
Python Programming Learning Circle
Sep 2, 2024 · Backend Development

Integrating Alipay Payment Gateway in Python Projects

This article explains why third‑party payment is needed, outlines Alipay’s workflow, guides through obtaining APPID and generating public/private keys, and provides a complete Python implementation—including key handling, request signing, and API usage—to integrate Alipay payments into backend applications.

AlipayBackendPayment Integration
0 likes · 7 min read
Integrating Alipay Payment Gateway in Python Projects
AntTech
AntTech
Aug 12, 2024 · Information Security

Ant Group’s Tongsuo Open‑Source Cryptography Project Earns Commercial Cryptography Product Certification (Level 2)

Ant Group’s cryptography team, leveraging the open‑source Tongsuo project and its proprietary Ant Card, has obtained a Level 2 commercial cryptography product certification under GM/T 0028, demonstrating compliance with China’s national cryptographic standards and offering a hybrid software‑hardware security solution for enterprises.

Ant GroupGM/T 0028Security Certification
0 likes · 7 min read
Ant Group’s Tongsuo Open‑Source Cryptography Project Earns Commercial Cryptography Product Certification (Level 2)
AntTech
AntTech
Jul 7, 2024 · Information Security

2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models

The 2024 WAIC Privacy Computing Forum gathered leading experts from academia and industry to discuss how encryption, anonymization, and secure multi‑party computation can protect data privacy while enabling large‑model training and inference, highlighting technical challenges, standards, and emerging solutions across AI, big data, and information security domains.

AIMPCPrivacy Computing
0 likes · 15 min read
2024 WAIC Forum on Privacy Computing: Enabling Trusted Data Sharing for Large Models
Open Source Tech Hub
Open Source Tech Hub
Jul 2, 2024 · Information Security

Master GmSSL: Build, Install, and Use China’s National Cryptography Suite

This guide introduces GmSSL, an OpenSSL‑compatible toolbox that implements China’s national cryptographic algorithms, explains its lightweight and cross‑platform features, and provides step‑by‑step instructions for compiling, installing, and using core commands, SM4/SM3/SM2 operations, and certificate authority workflows.

GmSSLOpenSSLSM2
0 likes · 12 min read
Master GmSSL: Build, Install, and Use China’s National Cryptography Suite
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jun 29, 2024 · Information Security

Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates

This article provides a thorough walkthrough of OpenSSL, covering cryptographic standards, symmetric and asymmetric encryption commands, message digests, certificate creation and management, as well as useful utilities like random number generation and password hashing, all illustrated with practical command‑line examples.

OpenSSLcertificatescryptography
0 likes · 26 min read
Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates
Architecture Digest
Architecture Digest
Jun 7, 2024 · Information Security

Implementing RSA Encryption and Decryption in Spring Boot APIs

This article explains how to secure Spring Boot API responses using RSA asymmetric encryption and digital signatures, covering RSA fundamentals, project setup, Maven configuration, key management, annotation‑driven encryption/decryption, front‑end JavaScript encryption with JSEncrypt, and practical testing steps.

JavaRSASecurity
0 likes · 10 min read
Implementing RSA Encryption and Decryption in Spring Boot APIs
AntTech
AntTech
Jun 7, 2024 · Information Security

Unified Security Grading Standards Are Essential for the Trusted Deployment of Privacy Computing

The article explains how the diversity of privacy‑computing techniques creates confusion and reluctance in industry, argues for a unified security‑capability grading framework, and highlights recent standard‑setting efforts such as the Q/NFEC0001‑2024 guideline to balance safety and performance across sectors.

FinTechPrivacy Computingartificial intelligence
0 likes · 6 min read
Unified Security Grading Standards Are Essential for the Trusted Deployment of Privacy Computing
php Courses
php Courses
Jun 3, 2024 · Information Security

Implementing Large Integer Modular Inverse in PHP with GMP

This article explains how to perform large‑integer modular inverse calculations using PHP and the GMP library, covering installation of the GMP extension, loading it in code, and demonstrating the gmp_invert() function with example code and important considerations for correct results.

GMPPHPcryptography
0 likes · 4 min read
Implementing Large Integer Modular Inverse in PHP with GMP
macrozheng
macrozheng
May 9, 2024 · Information Security

Why Servers Never Store Your Original Password: A Deep Dive into Secure Hashing

This article explains why servers cannot know your original password, covering the principles of password hashing, the difference between cryptographic and non‑cryptographic hash functions, the role of salts, and a Java example using SHA‑256 with salt to securely store passwords.

JavaSHA-256Security
0 likes · 6 min read
Why Servers Never Store Your Original Password: A Deep Dive into Secure Hashing
Python Programming Learning Circle
Python Programming Learning Circle
Apr 19, 2024 · Fundamentals

Comprehensive Introduction to Python Algorithms: Sorting, Searching, and Cryptography

This article introduces a curated collection of Python algorithm implementations, covering basic sorting and searching techniques, as well as advanced methods like quickselect and tabu search, as well as cryptographic algorithms such as Caesar, Vigenère, and RSA, with explanations, visualizations, and links to the GitHub repository for further study.

AlgorithmsData StructuresPython
0 likes · 15 min read
Comprehensive Introduction to Python Algorithms: Sorting, Searching, and Cryptography
macrozheng
macrozheng
Apr 11, 2024 · Information Security

Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms

The article explains why MD5 and simple salted hashes are insecure for password storage, distinguishes between cryptographic and non‑cryptographic hash functions, introduces slow key‑derivation algorithms such as Bcrypt, Scrypt and Argon2, and recommends using strong KDFs with unique salts in modern applications.

KDFMD5bcrypt
0 likes · 7 min read
Why MD5 Is Unsafe for Passwords and How to Choose Secure Hashing Algorithms
php Courses
php Courses
Apr 10, 2024 · Backend Development

Implementing Modular Inverse for Large Numbers in PHP Using GMP

This article explains how to use PHP's GMP extension to compute the modular inverse of large integers, provides a reusable function, demonstrates its usage with a concrete example, and shows the resulting output, illustrating the practicality of big‑number arithmetic in cryptographic contexts.

GMPbig integerscryptography
0 likes · 3 min read
Implementing Modular Inverse for Large Numbers in PHP Using GMP
Open Source Linux
Open Source Linux
Mar 7, 2024 · Information Security

Why China’s National Cryptographic Algorithms Matter: SM1‑SM9 Explained

The article introduces China’s national cryptographic standards—including SM1, SM2, SM3, SM4, SM7, SM9 and ZUC—explaining their origins, key features, implementation details, comparison with international algorithms, and typical use cases such as AD‑WAN, IPsec, and 4G/5G VPDN networks, highlighting their role in enhancing information security.

BlockchainSM2SM3
0 likes · 16 min read
Why China’s National Cryptographic Algorithms Matter: SM1‑SM9 Explained
OPPO Amber Lab
OPPO Amber Lab
Jan 26, 2024 · Information Security

BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits

This article analyzes the BLUFFS vulnerability disclosed at ACM CCS 2023, detailing how the legacy Bluetooth security mechanism (LSC) allows attackers to manipulate authentication and key‑generation parameters, leading to forward‑secrecy and future‑secrecy breaches, and evaluates the impact across devices supporting Bluetooth 4.2‑5.4.

BluetoothLSCSC
0 likes · 27 min read
BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits
AntTech
AntTech
Dec 22, 2023 · Information Security

2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences

In late 2023, Ant Group and academic partners reported fourteen security‑focused research papers accepted at top venues such as USENIX Security, ACM CCS, and USENIX ATC, covering privacy‑preserving computation, secure two‑party GBDT training, macOS kernel fuzzing, privacy‑preserving ML frameworks, Rust OOM handling, and more.

MPCSystemscryptography
0 likes · 18 min read
2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences
MaGe Linux Operations
MaGe Linux Operations
Nov 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates

HTTPS protects online communications by combining TLS encryption, digital certificates, and cryptographic techniques such as symmetric and asymmetric encryption, hash functions, and certificate authorities, ensuring confidentiality, integrity, authentication, and non‑repudiation, while addressing key exchange, trust chains, and common security pitfalls.

Certificate AuthorityHTTPSTLS
0 likes · 17 min read
How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates
Java Backend Technology
Java Backend Technology
Nov 17, 2023 · Information Security

Why Java’s Random Is Insecure and How SecureRandom Saves Your Data

The article explains that Java’s Random class uses a predictable linear‑congruential generator, making its output vulnerable to seed‑guessing attacks, and demonstrates how SecureRandom with strategies like SHA1PRNG, NativePRNGBlocking, and NativePRNGNonBlocking provides stronger, non‑predictable randomness suitable for security‑critical applications.

JavaSecureRandomcryptography
0 likes · 12 min read
Why Java’s Random Is Insecure and How SecureRandom Saves Your Data
Open Source Tech Hub
Open Source Tech Hub
Nov 5, 2023 · Information Security

Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide

This guide explains fundamental data encryption concepts, introduces PHP's openssl_encrypt function, compares common encryption modes, shows how to generate keys and initialization vectors, and provides a complete SM4‑CBC implementation with sample code and practical security precautions.

OpenSSLPHPSM4
0 likes · 8 min read
Mastering PHP Data Encryption with OpenSSL and SM4: A Practical Guide
Laravel Tech Community
Laravel Tech Community
Sep 12, 2023 · Information Security

OpenSSL 3.2 Alpha Release Introduces New Features and Protocol Support

The OpenSSL 3.2 Alpha has been released, adding client‑side QUIC support, TLS certificate compression, deterministic ECDSA, expanded Ed25519/Ed448 capabilities, AES‑GCM‑SIV, Argon2 with thread‑pool, HPKE, raw public‑key TLS, TCP Fast Open, pluggable post‑quantum signatures, Brainpool curves, SM4‑XTS, and optional Windows certificate‑store integration.

Alpha ReleaseOpenSSLProtocols
0 likes · 2 min read
OpenSSL 3.2 Alpha Release Introduces New Features and Protocol Support
AntTech
AntTech
Sep 2, 2023 · Information Security

Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information

The announcement details a September 7 forum hosted by the China Cryptology Society, featuring eight technical talks on cutting‑edge cryptographic and data‑security technologies—including hardware security, secure GPT inference, volume‑hiding encrypted multi‑maps, end‑to‑same‑end encryption, fully homomorphic encryption databases, dishonest‑majority MPC, active privacy computing, and the Bicoptor protocol—along with speaker biographies and abstracts.

MPCcryptographydata security
0 likes · 15 min read
Innovative Cryptographic Technologies and Applications Forum – Session Summaries and Speaker Information
Python Programming Learning Circle
Python Programming Learning Circle
Jun 24, 2023 · Fundamentals

Comprehensive Introduction to Python Algorithms: Principles, Implementations, and Resources

This article presents a thorough overview of Python algorithm fundamentals, covering sorting, searching, cryptographic techniques, and neural‑network examples, while linking to the open‑source TheAlgorithms/Python repository that provides both theoretical explanations and ready‑to‑run code samples for learners.

AlgorithmsData StructuresSearching
0 likes · 13 min read
Comprehensive Introduction to Python Algorithms: Principles, Implementations, and Resources
AntTech
AntTech
Apr 28, 2023 · Information Security

Threshold Proxy Re‑Encryption (TPRE) with National Cryptographic Algorithms for Secure Data Sharing

The article explains how cryptographic access control, especially a hybrid‑encrypted Threshold Proxy Re‑Encryption scheme built on national SM2/SM3/SM4 algorithms, offers high‑strength, decentralized, and efficient data authorization and sharing, addressing the limitations of traditional role‑based models.

Distributed Systemsaccess controlcryptography
0 likes · 5 min read
Threshold Proxy Re‑Encryption (TPRE) with National Cryptographic Algorithms for Secure Data Sharing
AntTech
AntTech
Mar 31, 2023 · Artificial Intelligence

Web Photo Source Identification Based on Neural Enhanced Camera Fingerprint

This paper presents a neural‑enhanced camera fingerprint framework combined with zero‑knowledge proof and digital signature schemes to reliably trace the originating device of photos, offering high‑accuracy identification, privacy preservation, and resistance to forgery across various application scenarios.

Neural NetworkZero Knowledge Proofcamera fingerprint
0 likes · 8 min read
Web Photo Source Identification Based on Neural Enhanced Camera Fingerprint
DataFunSummit
DataFunSummit
Feb 10, 2023 · Information Security

Digital Watermarking Technology: Concepts, Models, Algorithms, and Applications

The article provides a comprehensive overview of digital watermarking, covering its fundamental concepts, security features, embedding/detection/extraction processes, major algorithm families, practical applications such as copyright protection and anti‑counterfeiting, and future research directions in multimedia information security.

MultimediaSignal Processingcryptography
0 likes · 20 min read
Digital Watermarking Technology: Concepts, Models, Algorithms, and Applications
AntTech
AntTech
Dec 30, 2022 · Information Security

Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol

The 2022 Trusted Privacy Computing Summit announced and released the industry's first open white‑box protocol, the ECDH‑PSI interconnection protocol, detailing its design, implementation highlights, and open‑source availability to promote interoperable and secure privacy‑preserving data collaboration across platforms.

ECDH-PSIInteroperabilityPrivacy Computing
0 likes · 6 min read
Release of the First Open White‑Box Protocol for Privacy Computing: ECDH‑PSI Interconnection Protocol
AntTech
AntTech
Dec 9, 2022 · Information Security

Ant Group’s Open‑Source Cryptographic Library “Tongsuo” Receives National Commercial Cryptography Certification

Ant Group’s self‑developed open‑source cryptographic library Tongsuo, formerly BabaSSL, has become the world’s first open‑source project to obtain the national commercial cryptography product certification, confirming its compliance with GM/T 0028 security standards and its suitability for secure data storage, transmission, and privacy‑preserving applications.

Ant GroupTongsuocommercial certification
0 likes · 4 min read
Ant Group’s Open‑Source Cryptographic Library “Tongsuo” Receives National Commercial Cryptography Certification
AntTech
AntTech
Dec 3, 2022 · Information Security

IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group

The IEEE Standards Association has officially launched the Trusted Enclave Computing (P3181) standard project, led by Ant Group with participation from Chinese research institutes and companies, aiming to define technical frameworks, security requirements, and guidelines for designing, developing, testing, and maintaining privacy-preserving computing systems.

IEEE StandardPrivacy ComputingTECC
0 likes · 4 min read
IEEE Launches Trusted Enclave Computing (TECC) Standard Initiative Led by Ant Group
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2022 · Information Security

Understanding Network Security: Threats, Encryption, and Defense Mechanisms

This article provides a comprehensive overview of network security, covering passive and active threats, cryptographic models, digital signatures, authentication methods, key distribution, firewalls, and intrusion detection systems, highlighting essential concepts and practical defenses.

Firewallscryptographydigital signatures
0 likes · 14 min read
Understanding Network Security: Threats, Encryption, and Defense Mechanisms
DaTaobao Tech
DaTaobao Tech
Sep 27, 2022 · Information Security

Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes

This article examines the inherent security flaws of plain HTTP, proposes four solution approaches, and explains why the fourth—combining digital certificates, asymmetric and symmetric encryption—forms the basis of HTTPS, then details TLS 1.2 handshake steps, cryptographic primitives, and practical implementation considerations.

HTTPSTLSTLS Handshake
0 likes · 21 min read
Why HTTP Is Insecure and How HTTPS Solves It: A Deep Dive into TLS Handshakes
DataFunTalk
DataFunTalk
Sep 12, 2022 · Information Security

Understanding Provable Security in Privacy Computing and Differential Privacy

This article explains why privacy‑preserving computation requires provable security, describes how to define security assumptions, illustrates game‑based and simulation‑based proof techniques with Paillier homomorphic encryption and OT examples, and discusses how differential privacy can complement cryptographic guarantees while highlighting practical challenges.

Privacy Computingcryptographydifferential privacy
0 likes · 15 min read
Understanding Provable Security in Privacy Computing and Differential Privacy
AntTech
AntTech
Sep 3, 2022 · Information Security

Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions

The Trusted Privacy Computing Summit at the 2022 World AI Conference gathered leading scholars and industry experts to discuss cryptographic techniques, data security, and the practical rollout of privacy‑computing technologies across finance, healthcare, and cross‑border data services, emphasizing responsible digital economy development.

AIPrivacy Computingcryptography
0 likes · 8 min read
Trusted Privacy Computing Summit at the 2022 World AI Conference Highlights Security Challenges and Future Directions
Bilibili Tech
Bilibili Tech
Aug 23, 2022 · Information Security

Constant-Time Implementation and Optimization of SM2 Finite Field Inversion

The article analyzes constant‑time computation of the multiplicative inverse in SM2’s prime field, compares the variable‑time Extended Euclidean Algorithm with a constant‑time Fermat‑based square‑and‑multiply exponentiation, optimizes the fixed exponent using add‑chain generation, and shows this reduces multiplications from ~187 to ~41, making inversion the dominant cost in secure SM2 signing.

Fermat's little theoremGoSM2
0 likes · 12 min read
Constant-Time Implementation and Optimization of SM2 Finite Field Inversion
AntTech
AntTech
Jul 29, 2022 · Information Security

Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook

The 2022 Trusted Privacy Computing Research Report, released by the Privacy Computing Alliance and Ant Group, defines trusted privacy computing, outlines its five core elements, discusses security verification methods, introduces the TECC technology, and highlights policy and market drivers shaping the data‑in‑cipher era.

Privacy ComputingTECCcryptography
0 likes · 11 min read
Trusted Privacy Computing Research Report (2022): Definition, Core Elements, and Industry Outlook
AntTech
AntTech
Jul 26, 2022 · Information Security

Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview

TECC (Trusted‑Environment‑based Cryptographic Computing) combines trusted computing and cryptographic protocols to enable large‑scale, secure, high‑performance privacy‑preserving data analysis, offering superior security, reliability, cost‑effectiveness, and applicability across diverse multi‑party scenarios such as East‑West computing and joint risk control.

Privacy ComputingTECCcryptography
0 likes · 14 min read
Trusted‑Environment‑Based Cryptographic Computing (TECC): Security, Performance, and Application Overview
AntTech
AntTech
Jul 21, 2022 · Information Security

Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders

In early July Ant Group announced the open‑source release of its trusted privacy‑computing framework “YinYu”, with Chinese Academy of Sciences academician Wang Xiaoyun and senior officials from the banking and telecom sectors discussing the technology’s security challenges, compliance issues, performance trade‑offs, and the broader impact of open‑source on data sharing and industry innovation.

Industry collaborationPrivacy Computingcryptography
0 likes · 8 min read
Ant Group Open‑sources Trusted Privacy Computing Framework “YinYu” – Perspectives from Academics and Industry Leaders
DataFunSummit
DataFunSummit
Jul 19, 2022 · Information Security

Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing

This article explores the limitations of current non‑fully homomorphic privacy computing techniques, traces the evolution of fully homomorphic encryption, examines its practical applications in finance and machine learning, and discusses engineering challenges, protocol choices, and implementation considerations for secure data processing.

Financial ApplicationsFully Homomorphic EncryptionPrivacy Computing
0 likes · 16 min read
Fully Homomorphic Encryption: Origins, Development, Applications, and Engineering Challenges in Privacy Computing
ELab Team
ELab Team
Jul 7, 2022 · Information Security

Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained

This article examines why passwords are often insecure, explains how they should be stored using hash algorithms and salts, outlines common password‑weaknesses and system vulnerabilities, and introduces FIDO/WebAuthn as a modern, password‑less authentication solution.

AuthenticationFIDOHashing
0 likes · 31 min read
Is Your Password Really Secure? Hashing, Salting, and WebAuthn Explained
IT Architects Alliance
IT Architects Alliance
Jun 22, 2022 · Information Security

Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation

This article examines the challenges of securing API interfaces—including authentication for third‑party services and protection against request hijacking—and proposes a comprehensive RPC encryption framework that uses asymmetric and symmetric keys, signed payloads, and HTTPS fallback, detailing both client‑side and server‑side workflows, data structures, and providing links to the full source code.

API SecurityAuthenticationRPC encryption
0 likes · 5 min read
Secure RPC Encryption: Authentication, Anti‑Hijacking Design & Implementation
AntTech
AntTech
Jun 10, 2022 · Information Security

Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances

Trusted-Environment-based Cryptographic Computing (TECC), an Ant Group innovation that combines cryptographic MPC/FL with full‑stack trusted execution, has secured a new patent and demonstrates 10‑ to 100‑fold speed improvements, enabling large‑scale encrypted data processing for privacy‑critical applications.

Privacy ComputingTECCcryptography
0 likes · 5 min read
Trusted-Environment-based Cryptographic Computing (TECC): Patent Authorization and Performance Advances
Architecture Digest
Architecture Digest
May 24, 2022 · Information Security

Encryption Algorithms and Their Application in User Management Modules

This article introduces common encryption algorithms—symmetric, asymmetric, and hash—explains where encryption is needed in a user management module, and details implementation steps using RSA and AES128, while also warning about man‑in‑the‑middle attacks and recommending best practices.

AESMD5RSA
0 likes · 9 min read
Encryption Algorithms and Their Application in User Management Modules
php Courses
php Courses
May 23, 2022 · Information Security

Implementing the SHA-256 Hash Algorithm in PHP from Scratch

This article explains the theory behind cryptographic hash functions and provides a complete PHP implementation of the SHA‑256 algorithm, detailing each processing step—from converting strings to binary to final compression—along with supporting helper functions and reference tables.

Binary OperationsSHA-256cryptography
0 likes · 19 min read
Implementing the SHA-256 Hash Algorithm in PHP from Scratch
MaGe Linux Operations
MaGe Linux Operations
May 21, 2022 · Information Security

Test Your Cybersecurity Knowledge with 10 Quick Quiz Questions

This article presents ten multiple‑choice questions covering symmetric and asymmetric encryption, web malware, cookie security, access control, ARP spoofing, malicious code detection, buffer overflows, SQL injection, and rainbow‑table defenses, letting readers assess their information‑security expertise.

QuizWeb Securitycryptography
0 likes · 6 min read
Test Your Cybersecurity Knowledge with 10 Quick Quiz Questions
MaGe Linux Operations
MaGe Linux Operations
May 7, 2022 · Information Security

Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures

This article introduces fundamental cryptography concepts, explaining how symmetric and asymmetric encryption work, the role of key exchange, the purpose and properties of hashing algorithms, and how digital signatures combine encryption and hashing to ensure data authenticity and integrity.

Hashingcryptographydigital signatures
0 likes · 7 min read
Cryptography Basics: Symmetric, Asymmetric, Hashing & Digital Signatures
AntTech
AntTech
Apr 26, 2022 · Information Security

Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations

The article explores the rapid growth of privacy computing in China, highlighting new data protection laws, a surge in patents, real‑world applications such as medical data sharing, and personal stories of Ant Group engineers who develop cutting‑edge cryptographic frameworks and champion interdisciplinary research.

AIAnt GroupPrivacy Computing
0 likes · 13 min read
Privacy Computing: Insights from Ant Group’s Pioneering Researchers and Their Innovations